Sentinel-One / sack-cve-fixerLinks
SentinelOne's SACK CVE Fixer
☆22Updated 6 years ago
Alternatives and similar repositories for sack-cve-fixer
Users that are interested in sack-cve-fixer are comparing it to the libraries listed below
Sorting:
- Passive Network Audit Framework☆32Updated 7 years ago
- Deploy MISP Project software with Vagrant.☆45Updated 5 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- An extensible honeypot framework☆96Updated 3 years ago
- Automatically exported from code.google.com/p/nipper-ng☆72Updated 3 years ago
- Nmap Script to scan for Winnti infections☆71Updated 7 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- OSINT tool to evaluate the trustworthiness of a company☆43Updated 5 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆60Updated last year
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Updated 6 years ago
- No-Script Automation Tool☆56Updated 7 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 7 years ago
- Nix Audit made easier (RHEL, CentOS)☆65Updated 6 months ago
- Real Time Threat Monitoring Tool☆113Updated 3 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated 2 weeks ago
- Check IOC provided by a MISP instance on Suricata events☆18Updated 6 years ago
- A CVE Heatmap Using CalPlot☆97Updated 4 years ago
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Updated 7 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- THOR MITRE ATT&CK Framework Coverage☆25Updated 5 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- ☆20Updated 5 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 6 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆31Updated 5 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Updated 6 years ago